Lucene search

K
cve[email protected]CVE-2023-46657
HistoryOct 25, 2023 - 6:17 p.m.

CVE-2023-46657

2023-10-2518:17:40
CWE-697
web.nvd.nist.gov
24
cve-2023-46657
jenkins
gogs plugin
webhook token
security vulnerability

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.1%

Jenkins Gogs Plugin 1.0.15 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.

Affected configurations

NVD
Node
jenkinsgogsRange1.0.15jenkins
CPENameOperatorVersion
jenkins:gogsjenkins gogsle1.0.15

CNA Affected

[
  {
    "vendor": "Jenkins Project",
    "product": "Jenkins Gogs Plugin",
    "versions": [
      {
        "version": "0",
        "versionType": "maven",
        "lessThanOrEqual": "1.0.15",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.1%

Related for CVE-2023-46657